With season three of \u201cMr. Robot\u201d now on our screens we are in for another Hollywood-eye view into the murky world of cybercrime.\u00a0The series\u2019 main character, Elliot Alderson, a network technician by day and hacker by night, meets all our preconceived notions of a cybercriminal \u2013 young, male, introverted, and surgically attached to his black hoody. But stereotypes aside, \u201cMr. Robot\u201d is hailed by many in the cyber security world as the most realistic portrayal of hacker culture to-date, could it potentially provide some insight into the psychology of cyber criminals?Understanding the motivation and intent behind cyberattacks is as much a part of fighting cybercrime as is using sophisticated technologies to detect and eliminate threats.After all, cyber criminals use psychological manipulation to increase the effectiveness of their activities by preying upon human emotions of fear, anger, and embarrassment with ransomware attacks or phishing attacks exploiting the overwhelmed executive. As such, there is no reason why CISOs should not turn the tables and leverage psychology to identify key trends and behaviors to combat these criminal practices.The key motivations behind cybercrime can be broken down into three broad categories:Financial gainThe most obvious motivation behind cybercrime has traditionally been financial gain \u2013 both directly in the form of ransom payments and infiltrating financial systems, or indirectly, including stealing valuable data to be sold. To some, cybercrime is simply a way of making a living and is often more lucrative than using their skills for legitimate activities. Participants are lured into groups or networks by the promise of financial reward, often without fully understanding the legal or ethical implications of what they are doing.Political or social ideologyIdeology is a second motivation for cybercrime, illustrated by a high-profile hack in 2014, which forced Sony Pictures to pull a controversial movie. These types of activities are often referred to as hacktivism \u2013\u00a0 supposedly a more socially acceptable form of cyber criminality \u2013 and attacks are usually carried out in response to a perceived injustice. The \u201cfsociety\u201d network depicted in \u201cMr. Robot\u201d places itself in this hacktivist category, aiming to eradicate consumer debt by encrypting the financial data of a global corporation.\u00a0EntertainmentIn a similar way to trolling, cyberattacks can be carried out purely for the thrill. Perpetrators may be bored, wanting to rebel against the establishment, or seeking to outsmart their victims. And the perceived glamour and secretiveness of a hacker network \u2013 especially one with distinct branding like Anonymous \u2013 can seem exciting. Belonging to such a group makes individuals feel they are not personally responsible for their actions, and the apparent anonymity of the internet gives the impression those actions are less likely to have legal or social ramifications.\u00a0\u00a0 \u00a0\u00a0Psychological profiling within cybercrime is like that of other types of crime. Using geographic profiling to look at where the offender lives, works, and plays is often a less reliable indicator given today\u2019s edgeless networks, but similar patterns do exist in the digital world, especially when the individual is part of an organized network in constant communication. Inductive profiling, which uses behavioral patterns and demographic characteristics can be combined with deductive profiling which uses digital forensic evidence.\u00a0Security researchers \u2013 also known as white-hat hackers \u2013 employed by penetration testing companies to try to breach the defenses of systems and identify vulnerabilities that need fixing, provide CISOs with a view into the hacking underworld. As well as intentionally hacking into systems, these researchers can follow and interact with criminal communities to understand trends and predict attacks.There can be a fine line between legitimate cyber security investigation and criminal behavior, evidenced by the arrest of Marcus Hutchins \u2013 the British security researcher credited with stopping the WannaCry ransomware \u2013 on suspicion of creating a banking virus. But the experiences of security researchers can be invaluable in better understanding the mind of their black-hat counterparts. In fact, the apparent technological authenticity of Mr. Robot is credited to writer and technology producer, Kor Adana, who was formerly employed to test the security of car computers by attempting to hack into them.The latest season of \u201cMr. Robot\u201d is pure entertainment, but there is a serious message buried within its plot. The more intelligence CISOs have about cyber threats and the people behind them, the more likely these threats are to be detected and remediated quickly. By combining a deeper understanding of the psychological motivation behind cybercrime, security officers can finally get one step ahead of cyber criminals with technological tools to detect and prevent attacks \u2013 whether they\u2019re wearing their stereotypical black hoodies or not.